咨询与建议

限定检索结果

文献类型

  • 7,928 篇 会议
  • 5,360 篇 期刊文献
  • 91 册 图书

馆藏范围

  • 13,379 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8,825 篇 工学
    • 6,870 篇 计算机科学与技术...
    • 5,648 篇 软件工程
    • 1,805 篇 信息与通信工程
    • 1,082 篇 控制科学与工程
    • 926 篇 生物工程
    • 698 篇 电气工程
    • 628 篇 机械工程
    • 552 篇 电子科学与技术(可...
    • 512 篇 光学工程
    • 499 篇 生物医学工程(可授...
    • 344 篇 化学工程与技术
    • 298 篇 仪器科学与技术
    • 295 篇 安全科学与工程
    • 280 篇 动力工程及工程热...
    • 267 篇 网络空间安全
    • 260 篇 交通运输工程
    • 245 篇 建筑学
  • 4,172 篇 理学
    • 2,482 篇 数学
    • 1,003 篇 生物学
    • 826 篇 物理学
    • 718 篇 统计学(可授理学、...
    • 454 篇 系统科学
    • 374 篇 化学
  • 2,698 篇 管理学
    • 1,647 篇 管理科学与工程(可...
    • 1,178 篇 图书情报与档案管...
    • 595 篇 工商管理
  • 424 篇 医学
    • 365 篇 临床医学
    • 312 篇 基础医学(可授医学...
  • 380 篇 法学
    • 284 篇 社会学
  • 221 篇 经济学
    • 220 篇 应用经济学
  • 181 篇 教育学
  • 134 篇 农学
  • 56 篇 文学
  • 40 篇 艺术学
  • 38 篇 军事学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 353 篇 computer science
  • 321 篇 feature extracti...
  • 318 篇 semantics
  • 289 篇 computational mo...
  • 279 篇 deep learning
  • 218 篇 data mining
  • 196 篇 optimization
  • 184 篇 educational inst...
  • 181 篇 software enginee...
  • 178 篇 training
  • 166 篇 machine learning
  • 158 篇 predictive model...
  • 156 篇 image segmentati...
  • 151 篇 neural networks
  • 135 篇 wireless sensor ...
  • 135 篇 accuracy
  • 132 篇 servers
  • 129 篇 internet of thin...
  • 128 篇 support vector m...
  • 126 篇 convolution

机构

  • 474 篇 school of comput...
  • 373 篇 state key labora...
  • 295 篇 school of softwa...
  • 275 篇 school of softwa...
  • 265 篇 school of softwa...
  • 262 篇 department of co...
  • 260 篇 school of inform...
  • 218 篇 school of comput...
  • 210 篇 college of compu...
  • 176 篇 school of softwa...
  • 161 篇 school of comput...
  • 160 篇 college of compu...
  • 139 篇 school of comput...
  • 138 篇 school of comput...
  • 127 篇 school of comput...
  • 127 篇 school of comput...
  • 123 篇 school of comput...
  • 119 篇 school of softwa...
  • 116 篇 school of comput...
  • 101 篇 school of comput...

作者

  • 50 篇 gao yang
  • 43 篇 jin wang
  • 41 篇 liu yang
  • 41 篇 qi lianyong
  • 38 篇 wang lei
  • 38 篇 wang wei
  • 34 篇 chen huajun
  • 33 篇 qi liu
  • 33 篇 zhang wen
  • 33 篇 tao dacheng
  • 31 篇 zhao jian
  • 30 篇 li li
  • 30 篇 liu qi
  • 29 篇 junping du
  • 28 篇 sun xingming
  • 28 篇 shen furao
  • 27 篇 xiang-yang li
  • 27 篇 zhang zhao
  • 27 篇 zhang qiang
  • 26 篇 lei wang

语言

  • 12,593 篇 英文
  • 545 篇 其他
  • 257 篇 中文
  • 2 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer Science and Software Technology"
13379 条 记 录,以下是261-270 订阅
排序:
Semantic and secure search over encrypted outsourcing cloud based on BERT
收藏 引用
Frontiers of computer science 2022年 第2期16卷 152-159页
作者: Zhangjie FU Yan WANG Xingming SUN Xiaosong ZHANG Engineering Research Center of Digital Forensice Ministry of EducationNanjing University of Information Science and TechnologyNanjing 210044China School of Computer and Software Nanjing University of Information Science and TechnologyNanjing 210044China School of Computer Science and Engineering University of Electronic Science and Technology of ChinaChengdu 611731China
Searchable encryption provides an effective way for data security and privacy in cloud *** can retrieve encrypted data in the cloud under the premise of protecting their own data security and ***,most of the current c... 详细信息
来源: 评论
Multi-Optimiser Training for GANs Based on Evolutionary Computation  13
Multi-Optimiser Training for GANs Based on Evolutionary Comp...
收藏 引用
13th IEEE Congress on Evolutionary Computation, CEC 2024
作者: Zhang, Yixia Xue, Yu Neri, Ferrante School of Software Nanjing University of Information Science and Technology Nanjing China School of Computer Science and Electronic Engineering University of Surrey Guildford United Kingdom
Generative adversarial networks (GANs) are widely recognized for their impressive ability to generate realistic data. Despite the popularity of GANs, training them poses challenges such as mode collapse and instabilit... 详细信息
来源: 评论
CKKS and Local Differential Privacy based Model Parameters Encryption for Personalized Federated Learning  6
CKKS and Local Differential Privacy based Model Parameters E...
收藏 引用
6th International Conference on System Reliability and Safety Engineering, SRSE 2024
作者: Shen, Fanfan Hui, Lijie Liang, Qiwei Zhang, Jun Xu, Chao Chen, Yong He, Yanxiang Nanjing Audit University School of Computer Science Nanjing211815 China East China University of Science and Technology School of Software Nanchang330013 China Wuhan University School of Computer Science Wuhan430072 China
Federated learning achieves a certain degree of privacy protection by only uploading model parameters instead of the clients' raw data. However, attackers can still analyze model parameters to obtain sensitive dat... 详细信息
来源: 评论
Deep Combination of CDCl(T) and Local Search for Satisfiability Modulo Non-Linear Integer Arithmetic Theory  24
Deep Combination of CDCl(T) and Local Search for Satisfiabil...
收藏 引用
44th ACM/IEEE International Conference on software Engineering, ICSE 2024
作者: Zhang, Xindi Li, Bohan Cai, Shaowei Institute of Software Chinese Academy of Sciences School of Computer Science and Technology University of Chinese Academy of Sciences State Key Laboratory of Computer Science Beijing China
Satisfiability Modulo Theory (SMT) generalizes the propositional satisfiability problem (SAT) by extending support for various first-order background theories. In this paper, we focus on the SMT problems in Non-Linear... 详细信息
来源: 评论
Real-Time DAG Task Allocation Strategy for Multiprocessor by Optimistic Parallelism  24
Real-Time DAG Task Allocation Strategy for Multiprocessor by...
收藏 引用
24th IEEE International Conference on Communication technology, ICCT 2024
作者: Chen, Yumeng Liu, Songlin Zhou, Jianhong Ling, Xiang University of Electronic Science and Technology of China National Key Laboratory of Science and Technology on Communications China Xihua University School of Computer and Software Engineering China
In modern real-time operating systems, complex task loads are often modeled as directed acyclic graphs (DAG) and executed in parallel on multiprocessor systems. The topological constraints present in DAG tasks prevent... 详细信息
来源: 评论
Integrated Comprehensive Analysis Method for Education Quality with Federated Learning  5th
Integrated Comprehensive Analysis Method for Education Qual...
收藏 引用
5th International Conference on computer science and Educational Informatization, CSEI 2023
作者: Wang, Ruijin Chen, Tin Wang, Jinbo Lai, Jinshan Li, Jingwei Zhang, Mengjie Chen, Xuxia School of information and software engineering University of Electronic Science and Technology of China Chengdu611731 China School of Computer Science and Engineering University and Technology of china Chengdu611731 China
A thorough evaluation of education quality can help schools, governments, and related organizations evaluate education quality, detect persistent problems, act quickly, and raise teaching and educational standards. Tr... 详细信息
来源: 评论
Distributed Hierarchical Multi-Agent Reinforcement Learning for Real-World Adversarial Team Games  21
Distributed Hierarchical Multi-Agent Reinforcement Learning ...
收藏 引用
21st International computer Conference on Wavelet Active Media technology and Information Processing, ICCWAMTIP 2024
作者: Wei, Li Bei, Hui Ke, Lu School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu611731 China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu611731 China
Real-world applications often require teams of agents to coordinate strategies against adversaries. However, existing MARL models overlook resource constraints and task complexity, limiting their practical use. To add... 详细信息
来源: 评论
A sharding blockchain-based UAV system for search and rescue missions
收藏 引用
Frontiers of computer science 2025年 第3期19卷 103-118页
作者: Xihan ZHANG Jiashuo ZHANG Jianbo GAO Libin XIA Zhi GUAN Hao HU Zhong CHEN School of Computer Science Peking UniversityBeijing 100871China Peking University Chongqing Research Institute of Big Data Chongqing 401329China National Engineering Research Center for Software Engineering Peking UniversityBeijing 100871China State Key Lab for Novel Software Technology Nanjing UniversityNanjing 210023China
Sharding is a promising technique to tackle the critical weakness of scalability in blockchain-based unmanned aerial vehicle(UAV)search and rescue(SAR)*** breaking up the blockchain network into smaller partitions cal... 详细信息
来源: 评论
Two-Stage Lesion Detection Approach Based on Dimension-Decomposition and 3D Context
收藏 引用
Tsinghua science and technology 2022年 第1期27卷 103-113页
作者: Jiacheng Jiao Haiwei Pan Chunling Chen Tao Jin Yang Dong Jingyi Chen the College of Computer Science and Technology Harbin Engineering UniversityHarbin 150001China the School of Software Tsinghua UniversityBeijng 100084China
Lesion detection in Computed Tomography(CT) images is a challenging task in the field of computer-aided *** important issue is to locate the area of lesion *** a branch of Convolutional Neural Networks(CNNs),3D Contex... 详细信息
来源: 评论
An Early Depression Detection Model on Social Media using Emotional and Causal Features
An Early Depression Detection Model on Social Media using Em...
收藏 引用
2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023
作者: Zong, Linlin Zheng, Jian Zhang, Xianchao Liu, Xinyue Liang, Wenxin Xu, Bo Dalian University of Technology School of Software Dalian China Dalian University of Technology School of Computer Science and Technology Dalian China
Early depression detection is essential to enable healthcare professionals to effectively intervene and treat the depressive conditions. In existing research, an increasing number of psychological manifestations of de... 详细信息
来源: 评论